Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash

نویسنده

  • Donghoon Chang
چکیده

CellHash [3] and SubHash [4] were suggested by J. Daemen, R. Govaerts and J. Vandewalle in 1991 and 1992. SubHash is an improved version from CellHash. They have 257-bit internal state and 256-bit hash output. In this paper, we show a preimage attack on CellHash (SubHash) with the complexity 2 and the memory 2 for any t (with the complexity about 2 and the memory size 2). Even though we modify them in a famous way, we show that we can find a preimage on the modified CellHash (the modified SubHash) with the complexity 2 and the memory size 2 (with the complexity about 2 and the memory size 2).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Synthesis and Characterization of Nanocrystalline Zinc Oxide Thin Films via Green Chemistry

Green chemistry is an alternative route of which has overcome the limitations of other chemical methods. Nanocrystalline zinc oxide (NC-ZnO) with different structures have been grown on quartz plates by spin coating method by the use of plant extracts of Citrus aurantifolia which can be a cost effective and eco-friendly approach.. The present exploration describes the synthesis and characteriza...

متن کامل

Practical (Second) Preimage Attacks on TCS_SHA-3

TCS SHA-3 is a family of four cryptographic hash functions that are covered by an US patent (US 2009/0262925). The digest sizes are 224, 256, 384 and 512 bits. The hash functions use bijective functions in place of the standard, compression functions. In this paper we describe first and second preimage attacks on the full hash functions. The second preimage attack requires negligible time and t...

متن کامل

Prevalence of Hepatitis B Virus, Genotypes, and Mutants in HBsAg-Positive Patients in Meerut, India

Background: Genetic changeability of hepatitis B virus (HBV) signifies a challenge for the sensitivity of immunologic and molecular diagnostics. Therefore, knowing the spread of HBV genotypes (GENs) and mutation has considerable impacts on treatment strategies, vaccination program, diagnosis, and prevention. The present study aimed to detect HBV GENs and mutants in HBsAg-positive patients. Meth...

متن کامل

Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants

In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respec...

متن کامل

Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions

TCS_SHA-3 is a family of four cryptographic hash functions that are covered by a United States patent (US 2009/0262925). The digest sizes are 224, 256, 384 and 512 bits. The hash functions use bijective functions in place of the standard compression functions. In this paper we describe first and second preimage attacks on the full hash functions. The second preimage attack requires negligible t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2006  شماره 

صفحات  -

تاریخ انتشار 2006